The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, a novel method Reduced CORDIC Based Logarithm Converter (RCBLC) is introduced for computing the specific-based logarithm of the binary values, and then the hardware architecture of RCBLC based on FPGA is analyzed in detail. Hardware architecture of RCBLC is implemented such that it enables logarithm conversion with both high output bit-sensitivity and low resource utilization. In addition...
In this paper, aiming at the problem of imprecise localization and perturbation interference in the field of traditional large screen, large screen interactive system with projection technology is designed based on the affine transformation algorithm to realize the precise interactive region coordinate positioning. Any wall touch system of human-computer interaction has been obtained by the analysis...
Network function virtualization (NFV) introduces great flexibility in designing software-based network appliances to reduce cost and accelerate service deployment for network operators. However, with the fast development of high speed network of 100 GbE and beyond, how to efficiently design virtual network functions (VNF) on commodity servers has become a challenging problem. Although the advances...
Hardware-Assisted Flow Integrity extension (HAFIX) was proposed as a defense against code-reuse attacks that exploit backward edges (returns). HAFIX provides finegrained protection by confining return addresses to only target call sites in functions active on the call stack. We study whether the backward-edge policy in HAFIX is sufficient to prevent code-reuse exploits on real-world programs. In this...
Parking in modern world is always a subject of concern and isn't a task to be ignored as it was in old days. With modernization and introduction of digital devices, machines have taken a very important and irreplaceable role in human life. Parking nowadays is also done with the help of much advanced and sophisticated systems. The problem with most of these system is that they need a very high capital...
An Arithmetic logic Unit (ALU) is used in arithmetic, logical function in all processor. It is also an important subsystem in digital system design. Arithmetic Logic Unit (ALU) is one of the most important components of any system and is used in many appliances like calculators, cell phones, and computers. A 32-bit ALU was designed using Verilog HDL with the logical gates such as AND and OR for each...
Significant barriers to real time face detection have been the complexity of computation kernels, minimal costand superior accuracy requirements for both software and hardware implementation based on traditional high performance computing. It is desirable to develop variable precision face detection block for high dynamic range applications including night vision and infrared face detection applications...
Hardware Intelligence is an attractive concept that has the potential to make electronic, industrial and reliability-oriented applications efficiently optimized. This work investigates different frameworks and analyzes their challenges. Hardware automation faces different challenges like scalability, overhead, testability as well as goal definition. For better classification, hardware systems are...
This paper presents a novel Age-related Macular Degeneration (AMD) Big Data platform for future pharmaceutical applications. This platform is a network collecting AMD data from a large number of AMD patients in a central unit for data analytical purposes. Each network node is connected to a headset with graphical interface system for measuring the progression of AMD. Herein we discuss the proposed...
The smart use of the radio spectrum is viable with the use of Cognitive Radio (CR) techniques and Software Defined Radio (SDR) hardware. With that, this project aims to detect and utilize vacant TV channels for secondary users. The lack of spectrum sensing techniques and methods to identify the state of the TV spectrum in a particular time and location is a problem which is delaying the effective...
Denial of service (DoS) attacks have been one of the major network security problems over the last decades. DoS attacks can usually be mounted on hardware devices such as routers and firewalls to send spoofing messages to the target network. Thus, methods for defeating such DoS attacks are highly related to the vulnerabilities in the hardware devices. In this paper, we investigate the potential attacks...
The use of virtual devices in place of physical hardware is increasing in activities such as design, testing and debugging. Yet virtual devices are simply software applications, and like all software they are prone to faults. A full system simulator (FSS), is a class of virtual machine that includes a large set of virtual devices – enough to run the full target software stack. Defects in an FSS virtual...
The chance to influence the lives of a million children does not come often. Through a partnership between the BBC and several technology companies, a small instructional computing device called the BBC micro:bit will be given to a million children in the UK in 2016. Moreover, using the micro:bit will be part of the CS curriculum. We describe how Microsoft's Touch Develop programming platform works...
We survey recent strides made towards building a software framework that is capable of compiling quantum algorithms from a high-level description down to physical gates that can be implemented on a fault-tolerant quantum computer. We discuss why compilation and design automation tools such as the ones in our framework are key for tackling the grand challenge of building a scalable quantum computer...
As computer systems increase in size and complexity, bugs become ever subtler and more difficult to detect and diagnose. A bug could exist at different layers of computer systems (e.g., applications, shared libraries, file systems, device firmware), or could be caused by the incompatibility among layers. In many cases, bugs would require a very specific combination of events to be triggered and are...
In today's world, wireless communication became the master use in any technology that need transferring of data between devices in far distant places. The problems of paratrooper when they reach the land they are scattered and can't find each other's position quickly. Sometimes paratroops don't find their equipment that is thrown from the plane to the ground. The main objective of this study is to...
The On-Board computer (OBC) in CubeSat is the subsystem which acts as a bridge that connects the other subsystems with each other. It supervises many of the tasks that are done by the different subsystems of satellite and performs housekeeping and monitoring to ensure the health and status of those subsystems. The hardware and software design of the OBC mainly depends on the mission of the CubeSat...
This research shows the results of the modification of the Thai word prediction from NECTEC to support the effectiveness of word processing tools in improving the literacy skills and usability of the original Thai word prediction program for students with learning disabilities in grades 4–12. The entry strategies of 2 groups of 40 students with learning disabilities were compared. The original group...
The effective integrated approach for modeling of functional devices (FD), airborne computers and embedded systems on the devices design stage is proposed. This approach can be used at the manufacturers, which have a full production cycle, especially in the following industrial systems: instruments for onboard information processing and control, space systems, aviation systems and others. In the traditional...
We describe the pedagogy behind the MIT Beaver Works Summer Institute Robotics Program, a new high-school STEM program in robotics. The program utilizes state-of-the-art sensors and embedded computers for mobile robotics. These components are carried on an exciting 1/10-scale race-car platform. The program has three salient, distinguishing features: (i) it focuses on robotics software systems: the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.